8tiqa / vpn-security-analysis
Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN (using ARPspoof, chap2asleap, CUPP2 and ASLEAP) | In-depth research of IPv6 Leakage and DNS Hijacking i
☆17Updated 8 years ago
Alternatives and similar repositories for vpn-security-analysis:
Users that are interested in vpn-security-analysis are comparing it to the libraries listed below
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆21Updated 2 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Updated 7 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 7 years ago
- Network Guardian☆12Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- ☆47Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Gmail Knocker☆21Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago